Lucene search

K

Secure File Transfer Appliance Security Vulnerabilities

cve
cve

CVE-2008-3850

Cross-site scripting (XSS) vulnerability in Accellion File Transfer FTA_7_0_135 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to courier/forgot_password.html.

5.7AI Score

0.002EPSS

2008-08-27 11:41 PM
29
cve
cve

CVE-2008-7012

courier/1000@/api_error_email.html (aka "error reporting page") in Accellion File Transfer Appliance FTA_7_0_178, and possibly other versions before FTA_7_0_189, allows remote attackers to send spam e-mail via modified description and client_email parameters.

7AI Score

0.025EPSS

2009-08-19 10:30 AM
37
cve
cve

CVE-2009-4644

Accellion Secure File Transfer Appliance before 8_0_105 allows remote authenticated administrators to bypass the restricted shell and execute arbitrary commands via shell metacharacters to the ping command, as demonstrated by modifying the cli program.

7.5AI Score

0.003EPSS

2010-02-19 05:30 PM
20
cve
cve

CVE-2009-4645

Directory traversal vulnerability in web_client_user_guide.html in Accellion Secure File Transfer Appliance before 8_0_105 allows remote attackers to read arbitrary files via a .. (dot dot) in the lang parameter.

6.8AI Score

0.008EPSS

2010-02-19 05:30 PM
22
cve
cve

CVE-2009-4646

Static code injection vulnerability in the administrative web interface in Accellion Secure File Transfer Appliance allows remote authenticated administrators to inject arbitrary shell commands by appending them to a request to update the SNMP public community string.

7.2AI Score

0.001EPSS

2010-02-19 05:30 PM
28
cve
cve

CVE-2009-4647

Cross-site scripting (XSS) vulnerability in Accellion Secure File Transfer Appliance before 7_0_296 allows remote attackers to inject arbitrary web script or HTML via the username parameter, which is not properly handled when the administrator views audit logs.

5.8AI Score

0.002EPSS

2010-02-19 05:30 PM
23
cve
cve

CVE-2009-4648

Accellion Secure File Transfer Appliance before 8_0_105 does not properly restrict access to sensitive commands and arguments that run with extra sudo privileges, which allows local administrators to gain privileges via (1) arbitrary arguments in the --file_move action in /usr/local/bin/admin.pl, o...

7AI Score

0.001EPSS

2010-02-19 05:30 PM
30